DRBAC Model Using a WSNM for Services in i-Home(<Special Section>New Technologies and their Applications of the Internet IV)
スポンサーリンク
概要
- 論文の詳細を見る
RBAC (Role Based Access Control) was added the concept of the role which user can have access to resources based on the role of the user, and it increased efficiency and expandability. But, evolution of computing power and internet technology has caused the up rise of the dynamic environments, in accordance with it, it will be expected to require a dynamic access control model considering various elements. In this paper, we propose DRBAC (Dynamic RBAC) model in intelligent Home (i-Home). This is an access control model suitable for user-oriented service in i-Home. In order to consider dynamic environment in the existing RBAC models, the proposed model executes assignments user-role and permission-role based on context. In addition, the proposed model provides scalable access control policies which are suitable for the characteristics of intelligent environment as considering the user location information as a temporary constraints condition. Furthermore, we design and implement WSNM (Wireless Sensor Network Module) for its services. Finally, the proposed model provides flexible and efficient authentication method which applied Domain-Group concept as well as user/device authentication.
- 2006-12-01
著者
-
PARK Jong-Hyuk
Center for Information Security Technologies, Korea University
-
LEE Sangjin
Center for Information Security Technologies, Korea University
-
HONG In-Hwa
Korea Electronics Technology Institute
-
Lee Sangjin
Center For Information Security Technologies (cist) Korea University
-
Lee Sangjin
Center For Information Security Technologies Korea University
-
Park Jong-hyuk
Center For Information Security Technologies Korea University
関連論文
- DRBAC Model Using a WSNM for Services in i-Home(New Technologies and their Applications of the Internet IV)
- Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
- Impossible Differential Cryptanalysis of Zodiac(Special Section on Cryptography and Information Security)
- Construction of UOWHF : Two New Parallel Methods(Symmetric Key Cryptography)(Cryptography and Information Security)
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- Linear Attack Using Multiple Linear Approximations(Symmetric Key Cryptography)(Cryptography and Information Security)
- A Genetic Optimization Approach to Operation of a Multi-head Surface Mounting Machine